Top Banner
23
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Color Extended Visual Cryptography
Page 2: Color Extended Visual Cryptography

04/07/2023 2

CONTENTS:-

ABSTRACT EXISTING SYSTEM PROPOSED SYSTEM SRS DOCUMENT HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTSDESIGN PHASE REFERENCES

Page 3: Color Extended Visual Cryptography

Abstract

Visual Cryptography (VC) is a method of encrypting a secret image into some shares (transparencies) such that stacking a sufficient number of shares reveals the secret image and any qualified subset of the shares can recover the secret “visually”.

The first visual cryptographic technique was pioneered by Moni Naor and Adi Shamir. It involved breaking up the image into n shares so that only someone with all n shares could decrypt the image by overlaying each of the shares over each other.

Page 4: Color Extended Visual Cryptography

Practically, this can be done by printing each share on a separate transparency and then placing all of the transparencies on top of each other.

Visual secret sharing (VSS) schemes are used to protect the visual secret.

This scheme can be easily implemented on basis of a black & white VSS scheme and get much better block length.

Page 5: Color Extended Visual Cryptography

EXISTING SYSTEM

In Previous methods it show good results for black and white or gray scale VC schemes.

It is not sufficient to be applied directly to color shares due to different color structures.

Page 6: Color Extended Visual Cryptography

color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.

To avoid this the concept of visual information pixel (VIP) synchronization and error diffusion are introduced to attain a color visual cryptography encryption

Page 7: Color Extended Visual Cryptography

PROPOSED SYSTEM

In proposed system visual cryptography technique, to provide privacy protection when transmitting sensitive data between offices or computers.

Here visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.

Page 8: Color Extended Visual Cryptography

VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes.

Cost will be decreased

Page 9: Color Extended Visual Cryptography

MODULE DESCRIPTION:

USER INTERFACE

ENCRYPTION

DECRYPTION

Page 10: Color Extended Visual Cryptography

SRS DOcument :HARD WARE Requirements :

Processor : Pentium III

RAM : 128 MB / 256 MB (Recommended)

Hard disk : 20 GB

Page 11: Color Extended Visual Cryptography

Operating System: Win 9x/ XP

Programming Tool : Java 1.4.2

SOFTWARE Requirements :

Page 12: Color Extended Visual Cryptography

FUNCTIONAL Requirements :

INPUT: Encripting an image is done by giving receivers port number OUTPUT: Decripting an image is done through the senders port number

Page 13: Color Extended Visual Cryptography

nON FUNCTIONAL Requirements : •Usability

•Reliability

•Performance

•Supportability

•Throughput

Efficiency

Security

Page 14: Color Extended Visual Cryptography

04/07/2023 14

Design phase

USE CASE Diagram.CLASS Diagram.ACTIVITY Diagram.SEQUENCE DiagramCOLLABORATION Diagram.STATE CHART Diagram.

Page 15: Color Extended Visual Cryptography

Use case diagram

04/07/2023

15

select image to send

select two cover images

select ip and port number

encrypt

Sender

send

receive

receiver

decrypt

Page 16: Color Extended Visual Cryptography

Class diagram:-

Receiver

nameipaddressportnumber

selectip()selectportnumber()receiveimage()decrypt()

Sender

nameipaddressportnumber

selectimages()selectip()selectportnumber()encrypt()send()

Page 17: Color Extended Visual Cryptography

Activity diagram:-

Select image to send

Select two cover images

select ip and port number

encrypt

valid ip

Errorinvalid

receive

Send

decrypt

ReceiverSender

Page 18: Color Extended Visual Cryptography

SEQUENCE diagram:-s : Sender r : Receiver

select image to be hide

select two cover images

select ip address

select port number

encrypt

send

receive image

enter ip and port

decrypt

Page 19: Color Extended Visual Cryptography

COLLABORATION phase

s : Sender r : Receiver

1: select image to be hide2: select two cover images

3: select ip address4: select port number

5: encrypt

6: send

7: receive image8: enter ip and port

9: decrypt

Page 20: Color Extended Visual Cryptography

STATE CHART phase:active

select image to send

select two cover images

select ip and port number

encrypt

send

receive

decrypt

select image to send

select two cover images

select ip and port number

encrypt

send

receive

decrypt

Page 21: Color Extended Visual Cryptography

04/07/2023 21

references

M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Comput., vol. 129, no.

A. Houmansadr and S. Ghaemmaghami, “A novel video watermarking

method using visual cryptography,” in Proc. IEEE Int. Conf. Eng. Intell. Syst., 2006, pp.

M. S. Fu and O. C. Au, “Joint visual cryptography and watermarking ,” in Proc. IEEE Int. Conf. Multimedia Expo, 2004, pp. 975–978.

Page 22: Color Extended Visual Cryptography

04/07/2023 22

Queries….?

Page 23: Color Extended Visual Cryptography

THANK YOU